Conferences related to Computer viruses

Back to Top

2011 3rd International Workshop on Education Technology and Computer Science (ETCS)

ETCS2011 will be held on 12-13 March, 2011 in Wuhan, China. ETCS2009 and ETCS2010 have been indexed by EI Compendex and ISTP. The ETCS2011 will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2010 2nd International Workshop on Education Technology and Computer Science (ETCS)

    The 2nd International Workshop on Education Technology and Computer Science (ETCS2010) will be held on 6-7 March, 2010 in Wuhan, China. The workshop will bring together the top researchers from Asian Pacific nations, North America, Europe and around the world to exchange their research results and address open issues in Education Technology and Computer Science.

  • 2009 First International Workshop on Education Technology and Computer Science (ETCS)

    ETCS2009 is organized by Huazhong Universiy of Science and Technology, Harbin Institute of Technology,and supported by IEEE Harbin Section, Huazhong Normal University,Wuhan University. ETCS 2009 will be convened in the magnificent cultural city - Wuhan, China. ETCS 2009 will bring experts from several continents to give presentations, exchange information and learn about the latest developments in the field of education and computer science.


2010 Second International Conference on Computational Intelligence and Natural Computing (CINC)

The CINC 2010 conference provides a forum for engineers and scientists in academia, industry, and government to address profound issues including technical challenges, safety, social, legal, political, and economic issues, and to present and discuss their ideas, results, work in progress and experience on all aspects of computational intelligence and natural computing.



Periodicals related to Computer viruses

Back to Top

Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.


Systems, Man, and Cybernetics, Part B, IEEE Transactions on

The scope of the IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or between machines, humans, and organizations. The scope of Part B includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, ...




Xplore Articles related to Computer viruses

Back to Top

Computer virus propagation modeling and simulation

Li Zhuo; Li Changping 2011 3rd International Conference on Computer Research and Development, 2011

With the rapid development of Internet, computer viruses has become more and more serious, which attract more and more people's attention. Therefore, the spread of computer viruses were probed in this study. The computer virus propagation model was established, and the spread of computer viruses in different time system status and development trend were simulated. In addition, computer viruses spread ...


A parameter-free hybrid clustering algorithm used for malware categorization

ZhiXue Han; Shaorong Feng; Yanfang Ye; Qingshan Jiang 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, 2009

Nowadays, numerous attacks made by the malware, such as viruses, backdoors, spyware, trojans and worms, have presented a major security threat to computer users. The most significant line of defense against malware is antivirus products which detects, removes, and characterizes these threats. The ability of these AV products to successfully characterize these threats greatly depends on the method for categorizing ...


Composing system integrity using I/O automata

E. Amoroso; M. Merritt Tenth Annual Computer Security Applications Conference, 1994

The I/O automata model of Lynch and Turtle (1987) is summarized and used to formalize several types of system integrity based on the control of transitions to invalid starts. Type-A integrity is exhibited by systems with no invalid initial states and that disallow transitions from valid reachable to invalid states. Type-B integrity is exhibited by systems that disallow externally-controlled transitions ...


Most known vulnerabilities in Saudi Arabian web servers

Khaled S. Alghathbar; Maqsood Mahmud; Hanif Ullah 2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 2008

Vulnerabilities are the loopholes that arise due to poor programming or mis- configuration. Web Applications are considered to be very vulnerable to attack as compared to desktop programs on sole computers. Keeping this thing in our minds we decided to find out the all possible vulnerabilities in Saudi Arabian organizationpsilas Web servers. To assess these vulnerabilities we selected number of ...


The method of P2P traffic detecting for P2P harmful contents prevention

Ho Gyun Lee; Taek yong Nam; Jong Soo Jang The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005

Conventionally, a main interest in a computer security has been focused on protection of a computer system itself, i.e., protection against viruses or system attacks such as denial of service attacks (DoS attack), or communication encryption used for cash transfer service at a bank. However, with regard to influence given by exchanging contents to human beings, a research on automatic ...


More Xplore Articles

Educational Resources on Computer viruses

Back to Top

eLearning

Computer virus propagation modeling and simulation

Li Zhuo; Li Changping 2011 3rd International Conference on Computer Research and Development, 2011

With the rapid development of Internet, computer viruses has become more and more serious, which attract more and more people's attention. Therefore, the spread of computer viruses were probed in this study. The computer virus propagation model was established, and the spread of computer viruses in different time system status and development trend were simulated. In addition, computer viruses spread ...


A parameter-free hybrid clustering algorithm used for malware categorization

ZhiXue Han; Shaorong Feng; Yanfang Ye; Qingshan Jiang 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication, 2009

Nowadays, numerous attacks made by the malware, such as viruses, backdoors, spyware, trojans and worms, have presented a major security threat to computer users. The most significant line of defense against malware is antivirus products which detects, removes, and characterizes these threats. The ability of these AV products to successfully characterize these threats greatly depends on the method for categorizing ...


Composing system integrity using I/O automata

E. Amoroso; M. Merritt Tenth Annual Computer Security Applications Conference, 1994

The I/O automata model of Lynch and Turtle (1987) is summarized and used to formalize several types of system integrity based on the control of transitions to invalid starts. Type-A integrity is exhibited by systems with no invalid initial states and that disallow transitions from valid reachable to invalid states. Type-B integrity is exhibited by systems that disallow externally-controlled transitions ...


Most known vulnerabilities in Saudi Arabian web servers

Khaled S. Alghathbar; Maqsood Mahmud; Hanif Ullah 2008 4th IEEE/IFIP International Conference on Central Asia on Internet, 2008

Vulnerabilities are the loopholes that arise due to poor programming or mis- configuration. Web Applications are considered to be very vulnerable to attack as compared to desktop programs on sole computers. Keeping this thing in our minds we decided to find out the all possible vulnerabilities in Saudi Arabian organizationpsilas Web servers. To assess these vulnerabilities we selected number of ...


The method of P2P traffic detecting for P2P harmful contents prevention

Ho Gyun Lee; Taek yong Nam; Jong Soo Jang The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005., 2005

Conventionally, a main interest in a computer security has been focused on protection of a computer system itself, i.e., protection against viruses or system attacks such as denial of service attacks (DoS attack), or communication encryption used for cash transfer service at a bank. However, with regard to influence given by exchanging contents to human beings, a research on automatic ...


More eLearning Resources

IEEE-USA E-Books

  • Index

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • About the Editor

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Appendix B: Codes of Ethics

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Appendix C: Pointers to Additional Resources

    All you have to do is watch the news, or be warned not to open your email today, to recognize the necessity for this revised and enhanced edition of this critical work, first published in 1995. We are inundated daily with intellectual property issues and warnings against computer viruses and hackers. Government and law enforcement agency involvement in the security of our computer systems leaves us vulnerable to abuse of privacy, and raises the specter of "Big Brother". Also, many critical systems controlled by computers, such as nuclear power facilities and missile defense systems, are often designed and tested with an over-reliance on computer modeling, which can cause failure, injury or loss of life. _Ethics and Computing, Second Edition_ promotes awareness of these and other major issues and accepted procedures and policies in the area of ethics and computing, using real-world companies, incidents, products and people. An entire chapter is dedicated to detailed analysis o the major ethical codes relevant to computing professionals: The Association of Information Technology Professionals (AITP) code of ethics, IEEE (Institute of Electrical and Electronics Engineers) code of ethics, the Association of Computing Machinery codes of ethics, and the ACM/IEEE Software Engineering code of ethics. _Ethics and Computing, Second Edition_ is ideally suited for topical undergraduate courses with chapters and assignments designed to encourage critical thinking and informed ethical decisions. Furthermore, this invaluable book will keep abreast computer science, computer engineering, and information systems professionals and their colleagues of current ethical issues and responsibilities.

  • Computer Viruses as Artificial Life

    There has been considerable interest in computer viruses since they first appeared in 1981, and especially in the past few years as they have reached epidemic numbers in many personal computer environments. Viruses have been written about as a security problem, as a social problem, and as a possible means of performing useful tasks in a distributed computing environment. However, only recently have some scientists begun to ask if computer viruses are not a form of artificial life--a self-replicating organism. Simply because computer viruses do not exist as organic molecules may not be sufficient reason to dismiss the classification of this form of "vandalware" as a form of life. This paper begins with a description of how computer viruses operate and their history, and of the various ways computer viruses are structured. It then examines how viruses meet properties associated with life as defined by some researchers in the area of artificial life and self-organizing systems. The paper concludes with some comments directed toward the definition of artificially "alive" systems and experimentation.



Standards related to Computer viruses

Back to Top

No standards are currently tagged "Computer viruses"


Jobs related to Computer viruses

Back to Top